{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T21:53:57Z","timestamp":1775598837520,"version":"3.50.1"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030236953","type":"print"},{"value":"9783030236960","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-23696-0_11","type":"book-chapter","created":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T23:23:13Z","timestamp":1562023393000},"page":"209-228","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":82,"title":["Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4"],"prefix":"10.1007","author":[{"given":"Leon","family":"Botros","sequence":"first","affiliation":[]},{"given":"Matthias J.","family":"Kannwischer","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Schwabe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","unstructured":"Alagic, G., et al.: Status report on the first round of the NIST post-quantum cryptography standardization process. National Institute of Standards and Technology Internal Report 8240 (2019). https:\/\/doi.org\/10.6028\/NIST.IR.8240","DOI":"10.6028\/NIST.IR.8240"},{"key":"11_CR2","unstructured":"Alkim, E., et al.: NewHope: algorithm specification and supporting documentation. Submission to the NIST Post-Quantum Cryptography Standardization Project (2017). https:\/\/cryptojedi.org\/papers\/#newhopenist"},{"key":"11_CR3","unstructured":"Alkim, E., Ducas, L., P\u00f6ppelmann, T., Schwabe, P.: Post-quantum key exchange \u2013 a new hope. In: Holz, T., Savage, S. (eds.) Proceedings of the 25th USENIX Security Symposium. USENIX Association (2016). https:\/\/eprint.iacr.org\/2015\/1092"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-319-49445-6_19","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"E Alkim","year":"2016","unstructured":"Alkim, E., Jakubeit, P., Schwabe, P.: NewHope on ARM cortex-M. In: Carlet, C., Hasan, M.A., Saraswat, V. (eds.) SPACE 2016. LNCS, vol. 10076, pp. 332\u2013349. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49445-6_19. http:\/\/cryptojedi.org\/papers\/#newhopearm"},{"key":"11_CR5","unstructured":"Avanzi, R., et al.: ARM Cortex-M4 optimized implementation of Kyber. https:\/\/github.com\/pq-crystals\/kyber\/tree\/cm4\/cm4. Accessed 07 Mar 2019"},{"key":"11_CR6","unstructured":"Avanzi, R., et al.: CRYSTALS-Kyber: algorithm specification and supporting documentation. Submission to the NIST Post-Quantum Cryptography Standardization Project (2017). https:\/\/pq-crystals.org\/kyber"},{"key":"11_CR7","unstructured":"Avanzi, R., et al.: CRYSTALS-Kyber: algorithm specification and supporting documentation (version 2.0). Submission to the NIST Post-Quantum Cryptography Standardization Project (2019). https:\/\/pq-crystals.org\/kyber"},{"key":"11_CR8","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: The Keccak reference. Submission to the NIST SHA-3 competition (round 3) (2011). https:\/\/keccak.team\/files\/Keccak-reference-3.0.pdf"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Bos, J.W., et al.: CRYSTALS \u2013 kyber: A cca-secure module-lattice-based KEM. In: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 353\u2013367. IEEE (2018). https:\/\/eprint.iacr.org\/2017\/634","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"11_CR10","unstructured":"Bos, J.W., Friedberger, S., Martinoli, M., Oswald, E., Stam, M.: Fly, you fool! Faster Frodo for the ARM Cortex-M4. Cryptology ePrint Archive, Report 2018\/1116 (2018). https:\/\/eprint.iacr.org\/2018\/1116"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"de Clercq, R., Roy, S.S., Vercauteren, F., Verbauwhede, I.: Efficient software implementation of ring-LWE encryption. In: Design, Automation & Test in Europe Conference & Exhibition, DATE 2015, pp. 339\u2013344. EDA Consortium (2015). http:\/\/eprint.iacr.org\/2014\/725","DOI":"10.7873\/DATE.2015.0378"},{"key":"11_CR12","unstructured":"Cook, S.: On the Minimum Computation Time of Functions. Ph.D. thesis, Harvard University (1966)"},{"issue":"90","key":"11_CR13","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1090\/S0025-5718-1965-0178586-1","volume":"19","author":"JW Cooley","year":"1965","unstructured":"Cooley, J.W., Tukey, J.W.: An algorithm for the machine calculation of complex fourier series. Math. Comput. 19(90), 297\u2013301 (1965). https:\/\/www.jstor.org\/stable\/2003354","journal-title":"Math. Comput."},{"key":"11_CR14","unstructured":"Daemen, J., Hoffert, S., Peeters, M., Assche, G.V., Keer, R.V.: eXtended Keccak Code Package. https:\/\/github.com\/XKCP\/XKCP. Accessed 07 Mar 2019"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"E Fujisaki","year":"1999","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537\u2013554. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_34"},{"key":"11_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-9472-3","volume-title":"A History of Numerical Analysis from the 16th through the 19th Century","author":"HH Goldstine","year":"1977","unstructured":"Goldstine, H.H.: A History of Numerical Analysis from the 16th through the 19th Century. Springer, New York (1977). https:\/\/doi.org\/10.1007\/978-1-4684-9472-3"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-642-38616-9_5","volume-title":"Post-Quantum Cryptography","author":"T G\u00fcneysu","year":"2013","unstructured":"G\u00fcneysu, T., Oder, T., P\u00f6ppelmann, T., Schwabe, P.: Software speed records for lattice-based signatures. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 67\u201382. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38616-9_5. Document ID: d67aa537a6de60813845a45505c313, http:\/\/cryptojedi.org\/papers\/#lattisigns"},{"issue":"4","key":"11_CR18","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MASSP.1984.1162257","volume":"1","author":"M. Heideman","year":"1984","unstructured":"Heideman, M.T., Johnson, D.H., Burrus, C.S.: Gauss and the history of the fast fourier transform. IEEE ASSP Mag. 1(4) (1984). http:\/\/www.cis.rit.edu\/class\/simg716\/Gauss_History_FFT.pdf","journal-title":"IEEE ASSP Magazine"},{"key":"11_CR19","unstructured":"H\u00fclsing, A., Rijneveld, J., Schanck, J.M., Schwabe, P.: NTRU-KEM-HRSS: algorithm specification and supporting documentation. Submission to the NIST Post-Quantum Cryptography Standardization Project (2017). https:\/\/ntru-hrss.org"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Kannwischer, M.J., Rijneveld, J., Schwabe, P.: Faster multiplication in $$\\mathbb{Z}_{2^m}[x]$$ on Cortex-M4 to speed up NIST PQC candidates (2018). https:\/\/eprint.iacr.org\/2018\/1018","DOI":"10.1007\/978-3-030-21568-2_14"},{"key":"11_CR21","unstructured":"Kannwischer, M.J., Rijneveld, J., Schwabe, P., Stoffelen, K.: PQM4: post-quantum crypto library for the ARM Cortex-M4. https:\/\/github.com\/mupq\/pqm4. Accessed 07 Mar 2019"},{"key":"11_CR22","first-page":"595","volume":"7","author":"A Karatsuba","year":"1963","unstructured":"Karatsuba, A., Ofman, Y.: Multiplication of multidigit numbers on automata. Sov. Phys. Dokl. 7, 595\u2013596 (1963). Translated from Doklady Akademii Nauk SSSR, vol. 145, no. 2, pp. 293\u2013294, July 1962. Scanned version on http:\/\/cr.yp.to\/bib\/1963\/karatsuba.html","journal-title":"Sov. Phys. Dokl."},{"issue":"3","key":"11_CR23","doi-asserted-by":"crossref","first-page":"243","DOI":"10.46586\/tches.v2018.i3.243-266","volume":"2018","author":"A Karmakar","year":"2018","unstructured":"Karmakar, A., Mera, J.M.B., Roy, S.S., Verbauwhede, I.: Saber on ARM CCA-secure module lattice-based key encapsulation on ARM. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3), 243\u2013266 (2018). https:\/\/eprint.iacr.org\/2018\/682","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Lyubashevsky, V., Seiler, G.: NTTRU: Truly fast NTRU using NTT. Cryptology ePrint Archive, Report 2019\/040 (2019). https:\/\/eprint.iacr.org\/2019\/040","DOI":"10.46586\/tches.v2019.i3.180-201"},{"issue":"170","key":"11_CR25","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"PL Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Math. Comput. 44(170), 519\u2013521 (1985). http:\/\/www.ams.org\/journals\/mcom\/1985-44-170\/S0025-5718-1985-0777282-X\/S0025-5718-1985-0777282-X.pdf","journal-title":"Math. Comput."},{"key":"11_CR26","unstructured":"National Institute for Standards and Technology: Submission requirements and evaluation criteria for the post-quantum cryptography standardization process (2017). https:\/\/csrc.nist.gov\/csrc\/media\/projects\/post-quantum-cryptography\/documents\/call-for-proposals-final-dec-2016.pdf"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Oder, T., P\u00f6ppelmann, T., G\u00fcneysu, T.: Beyond ECDSA and RSA: lattice-based digital signatures on constrained devices. In: 2014 51st ACM\/EDAC\/IEEE Design Automation Conference (DAC), pp. 1\u20136. ACM (2014). https:\/\/www.sha.rub.de\/media\/attachments\/files\/2014\/06\/bliss_arm.pdf","DOI":"10.1109\/DAC.2014.6881437"},{"key":"11_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-319-22174-8_19","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2015","author":"T P\u00f6ppelmann","year":"2015","unstructured":"P\u00f6ppelmann, T., Oder, T., G\u00fcneysu, T.: High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers. In: Lauter, K., Rodr\u00edguez-Henr\u00edquez, F. (eds.) LATINCRYPT 2015. LNCS, vol. 9230, pp. 346\u2013365. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-22174-8_19. Extended version, https:\/\/eprint.iacr.org\/2015\/382"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Saarinen, M.J.O., Bhattacharya, S., Garcia-Morchon, O., Rietman, R., Tolhuizen, L., Zhang, Z.: Shorter messages and faster post-quantum encryption with Round5 on Cortex M. Cryptology ePrint Archive, Report 2018\/723 (2018). https:\/\/eprint.iacr.org\/2018\/723","DOI":"10.1007\/978-3-030-15462-2_7"},{"key":"11_CR30","unstructured":"Seiler, G.: Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography. Cryptology ePrint Archive, Report 2018\/039 (2018). https:\/\/eprint.iacr.org\/2018\/039"},{"key":"11_CR31","unstructured":"Reference manual for STM32F405\/415, STM32F407\/417, STM32F427\/437, and STM32F429\/439 advanced ARM-based 32-bit MCUs (2019). https:\/\/www.st.com\/resource\/en\/reference_manual\/dm00031020.pdf"},{"key":"11_CR32","unstructured":"Toom, A.L.: The complexity of a scheme of functional elements realizing the multiplication of integers. Sov. Math. Dokl. 3, 714\u2013716 (1963). www.de.ufpe.br\/~toom\/my-articles\/engmat\/MULT-E.PDF"},{"key":"11_CR33","unstructured":"Zhang, Z., Chen, C., Hoffstein, J., Whyte, W.: NTRUEncrypt: algorithm specification and supporting documentation. Submission to the NIST Post-Quantum Cryptography Standardization Project (2017). https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-1-submissions"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23696-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:24:53Z","timestamp":1710260693000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-23696-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030236953","9783030236960"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23696-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AFRICACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in Africa","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rabat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"africacrypt2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/africacrypt2019.aui.ma\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}